Applying a security architecture with key management framework to the delay/disruption tolerant networks

4Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.

Abstract

Recently, one of the growing hot topics in the field of wireless network is to enable of Delay/Disruption Tolerant Networking (DTN). It aims to solve the long delay paths and unpredictable link disruptions that occur in the challenged networks. In order to maintain a safe and secure DTN model, a secure way of key distribution would be required to provide robustness from all the attacks it suffers. This paper proposes a clear and illustrative security architecture for DTN with secure key management framework to distribute the cryptographic keys to the constituted nodes in a secure way. The performance of how the cryptographic keys work and perform during a node is departed away from the network are discussed. The distributed keys use the public key cryptography to mitigate during the network attacks. Along with the key management protocol, some degree of security features can be achieved with the bundle of security protocol to rescue the network model from any attacks.

Cite

CITATION STYLE

APA

Rajan, G., & Cho, G. (2015). Applying a security architecture with key management framework to the delay/disruption tolerant networks. International Journal of Security and Its Applications, 9(4), 327–336. https://doi.org/10.14257/ijsia.2015.9.4.30

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free